Lucene search

K
ciscoCiscoCISCO-SA-20160928-SMI
HistorySep 28, 2016 - 4:00 p.m.

Cisco IOS and IOS XE Software Smart Install Memory Leak Vulnerability

2016-09-2816:00:00
tools.cisco.com
13

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.7

Confidence

High

EPSS

0.003

Percentile

69.2%

The Smart Install client feature in Cisco IOS and IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a memory leak and eventual denial of service (DoS) condition on an affected device.

The vulnerability is due to incorrect handling of image list parameters. An attacker could exploit this vulnerability by sending crafted Smart Install packets to TCP port 4786. A successful exploit could cause a Cisco Catalyst switch to leak memory and eventually reload, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability other than disabling Smart Install functionality on the affected device.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-smi [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-smi”]

This advisory is part of the September 28, 2016, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 11 vulnerabilities. All the vulnerabilities have a Security Impact Rating of “High.” For a complete list of the advisories and links to them, see Cisco Event Response: September 2016 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-56513”].

Affected configurations

Vulners
Node
ciscoiosMatch12.2se
OR
ciscoiosMatch12.2ex
OR
ciscoiosMatch12.2ey
OR
ciscoiosMatch12.2ez
OR
ciscoiosMatch15.0ey
OR
ciscoiosMatch15.0se
OR
ciscoiosMatch15.1sg
OR
ciscoiosMatch15.0ex
OR
ciscoiosMatch15.0ea
OR
ciscoiosMatch15.2e
OR
ciscoiosMatch15.0ez
OR
ciscoiosMatch15.2ey
OR
ciscoiosMatch15.0ej
OR
ciscoiosMatch15.2eb
OR
ciscoiosMatch15.2ea
OR
ciscocisco_iosMatch3.2sexe
OR
ciscocisco_iosMatch3.3sexe
OR
ciscocisco_iosMatch3.3xoxe
OR
ciscocisco_iosMatch3.5exe
OR
ciscocisco_iosMatch3.6exe
OR
ciscocisco_iosMatch3.7exe
OR
ciscocisco_iosMatch3.8exe
OR
ciscoiosMatch12.2\(55\)se
OR
ciscoiosMatch12.2\(55\)se3
OR
ciscoiosMatch12.2\(55\)se2
OR
ciscoiosMatch12.2\(58\)se
OR
ciscoiosMatch12.2\(55\)se1
OR
ciscoiosMatch12.2\(58\)se1
OR
ciscoiosMatch12.2\(55\)se4
OR
ciscoiosMatch12.2\(58\)se2
OR
ciscoiosMatch12.2\(55\)se5
OR
ciscoiosMatch12.2\(55\)se6
OR
ciscoiosMatch12.2\(55\)se7
OR
ciscoiosMatch12.2\(55\)se8
OR
ciscoiosMatch12.2\(55\)se9
OR
ciscoiosMatch12.2\(55\)se10
OR
ciscoiosMatch12.2\(55\)ex
OR
ciscoiosMatch12.2\(55\)ex1
OR
ciscoiosMatch12.2\(55\)ex2
OR
ciscoiosMatch12.2\(55\)ex3
OR
ciscoiosMatch12.2\(55\)ey
OR
ciscoiosMatch12.2\(55\)ez
OR
ciscoiosMatch15.0\(1\)ey
OR
ciscoiosMatch15.0\(1\)ey2
OR
ciscoiosMatch15.0\(1\)se
OR
ciscoiosMatch15.0\(2\)se
OR
ciscoiosMatch15.0\(1\)se1
OR
ciscoiosMatch15.0\(1\)se2
OR
ciscoiosMatch15.0\(1\)se3
OR
ciscoiosMatch15.0\(2\)se1
OR
ciscoiosMatch15.0\(2\)se2
OR
ciscoiosMatch15.0\(2\)se3
OR
ciscoiosMatch15.0\(2\)se4
OR
ciscoiosMatch15.0\(2\)se5
OR
ciscoiosMatch15.0\(2\)se6
OR
ciscoiosMatch15.0\(2\)se7
OR
ciscoiosMatch15.0\(2\)se8
OR
ciscoiosMatch15.0\(2\)se9
OR
ciscoiosMatch15.0\(2a\)se9
OR
ciscoiosMatch15.1\(2\)sg
OR
ciscoiosMatch15.1\(2\)sg1
OR
ciscoiosMatch15.1\(2\)sg2
OR
ciscoiosMatch15.1\(2\)sg3
OR
ciscoiosMatch15.1\(2\)sg4
OR
ciscoiosMatch15.1\(2\)sg5
OR
ciscoiosMatch15.1\(2\)sg6
OR
ciscoiosMatch15.1\(2\)sg7
OR
ciscoiosMatch15.0\(2\)ex
OR
ciscoiosMatch15.0\(2\)ex1
OR
ciscoiosMatch15.0\(2\)ex2
OR
ciscoiosMatch15.0\(2\)ex3
OR
ciscoiosMatch15.0\(2\)ex4
OR
ciscoiosMatch15.0\(2\)ex5
OR
ciscoiosMatch15.0\(2\)ex6
OR
ciscoiosMatch15.0\(2\)ex7
OR
ciscoiosMatch15.0\(2\)ex8
OR
ciscoiosMatch15.0\(2a\)ex5
OR
ciscoiosMatch15.0\(2\)ex10
OR
ciscoiosMatch15.0\(2\)ex11
OR
ciscoiosMatch15.0\(2\)ea1
OR
ciscoiosMatch15.2\(1\)e
OR
ciscoiosMatch15.2\(2\)e
OR
ciscoiosMatch15.2\(1\)e1
OR
ciscoiosMatch15.2\(3\)e
OR
ciscoiosMatch15.2\(1\)e2
OR
ciscoiosMatch15.2\(1\)e3
OR
ciscoiosMatch15.2\(2\)e1
OR
ciscoiosMatch15.2\(2b\)e
OR
ciscoiosMatch15.2\(4\)e
OR
ciscoiosMatch15.2\(3\)e1
OR
ciscoiosMatch15.2\(2\)e2
OR
ciscoiosMatch15.2\(2a\)e1
OR
ciscoiosMatch15.2\(2\)e3
OR
ciscoiosMatch15.2\(2a\)e2
OR
ciscoiosMatch15.2\(3\)e2
OR
ciscoiosMatch15.2\(3a\)e
OR
ciscoiosMatch15.2\(3\)e3
OR
ciscoiosMatch15.2\(3m\)e2
OR
ciscoiosMatch15.2\(4\)e1
OR
ciscoiosMatch15.2\(2\)e4
OR
ciscoiosMatch15.2\(4m\)e1
OR
ciscoiosMatch15.0\(2\)ez
OR
ciscoiosMatch15.2\(1\)ey
OR
ciscoiosMatch15.0\(2\)ej
OR
ciscoiosMatch15.0\(2\)ej1
OR
ciscoiosMatch15.2\(2\)eb
OR
ciscoiosMatch15.2\(2\)eb1
OR
ciscoiosMatch15.2\(2\)eb2
OR
ciscoiosMatch15.2\(2\)ea
OR
ciscoiosMatch15.2\(2\)ea1
OR
ciscoiosMatch15.2\(2\)ea2
OR
ciscoiosMatch15.2\(3\)ea
OR
ciscoiosMatch15.2\(4\)ea
OR
ciscoiosMatch15.2\(4\)ea1
OR
ciscoiosMatch15.2\(2\)ea3
OR
ciscoiosMatch15.2\(4\)ea3
OR
ciscoiosMatch15.2\(4\)ea2
OR
ciscocisco_iosMatch3.2.0sexe
OR
ciscocisco_iosMatch3.2.1sexe
OR
ciscocisco_iosMatch3.2.2sexe
OR
ciscocisco_iosMatch3.2.3sexe
OR
ciscocisco_iosMatch3.3.0sexe
OR
ciscocisco_iosMatch3.3.1sexe
OR
ciscocisco_iosMatch3.3.2sexe
OR
ciscocisco_iosMatch3.3.3sexe
OR
ciscocisco_iosMatch3.3.4sexe
OR
ciscocisco_iosMatch3.3.5sexe
OR
ciscocisco_iosMatch3.3.0xoxe
OR
ciscocisco_iosMatch3.3.1xoxe
OR
ciscocisco_iosMatch3.3.2xoxe
OR
ciscocisco_iosMatch3.5.0exe
OR
ciscocisco_iosMatch3.5.1exe
OR
ciscocisco_iosMatch3.5.2exe
OR
ciscocisco_iosMatch3.5.3exe
OR
ciscocisco_iosMatch3.6.0exe
OR
ciscocisco_iosMatch3.6.1exe
OR
ciscocisco_iosMatch3.6.0aexe
OR
ciscocisco_iosMatch3.6.0bexe
OR
ciscocisco_iosMatch3.6.2aexe
OR
ciscocisco_iosMatch3.6.3exe
OR
ciscocisco_iosMatch3.6.4exe
OR
ciscocisco_iosMatch3.7.0exe
OR
ciscocisco_iosMatch3.7.1exe
OR
ciscocisco_iosMatch3.7.2exe
OR
ciscocisco_iosMatch3.7.3exe
OR
ciscocisco_iosMatch3.8.0exe
OR
ciscocisco_iosMatch3.8.1exe
OR
ciscocisco_iosMatch3.8.2exe
VendorProductVersionCPE
ciscoios12.2secpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*
ciscoios12.2excpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*
ciscoios12.2eycpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*
ciscoios12.2ezcpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*
ciscoios15.0eycpe:2.3:o:cisco:ios:15.0ey:*:*:*:*:*:*:*
ciscoios15.0secpe:2.3:o:cisco:ios:15.0se:*:*:*:*:*:*:*
ciscoios15.1sgcpe:2.3:o:cisco:ios:15.1sg:*:*:*:*:*:*:*
ciscoios15.0excpe:2.3:o:cisco:ios:15.0ex:*:*:*:*:*:*:*
ciscoios15.0eacpe:2.3:o:cisco:ios:15.0ea:*:*:*:*:*:*:*
ciscoios15.2ecpe:2.3:o:cisco:ios:15.2e:*:*:*:*:*:*:*
Rows per page:
1-10 of 1481

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.7

Confidence

High

EPSS

0.003

Percentile

69.2%

Related for CISCO-SA-20160928-SMI